Cybersecurity Fundamentals training

Cybersecurity Fundamentals

About this Course:

The Cybersecurity Fundamentals Course will provide learners with principles of data and technology that frame and define cybersecurity. Learners will gain insight into the importance of cybersecurity and the integral role of cybersecurity professionals. The interactive, mentor-guided format will provide a dynamic learning experience where users can explore foundational cybersecurity principles, security architecture, risk management, Risk Assessments, Type of Cyber-attacks, Cyber Security incident Management, and emerging IT and Information Security technologies.

Target Audience:
  • Zero to three years cybersecurity experience
  • Audit, risk, compliance, information security, government and legal professionals with a familiarity of basic IT/Information Security concepts
  • Professionals who are new to cybersecurity or are interested in entering the field of cybersecurity
  • Professionals interested in the ISACA Cybersecurity Fundamentals Certificate and Foundation for CISSP Exam

Duration: 24 hours (class) + 2 hours (Exam with discussion)

Course Outline: 

Introduction to Cybersecurity

  • Cybersecurity objectives
  • Cybersecurity roles
  • Comparison between Information Security & Cybersecurity

Cybersecurity Principles

  • Confidentiality, integrity, & availability of Information (CIA)
  • Disclosure, Alteration & Destruction of Information (DAD)
  • Authentication & nonrepudiation
  • Cybersecurity of networks, systems, applications and data including Firewalls, IDS, IPS etc.
  • OSI model and Networking Concepts (i.e. ports, protocols, VPNs, etc.)

Information Security (IS) within Information Lifecycle Management

  • Data Lifecycle management
  • Security architecture processes
  • Secure Development Lifecycle (SDLC)
  • Risk Modeling Fundamentals

Risks & Vulnerabilities

  • Basics of risk management including Risk Assessment methodology and Risk Mitigation techniques
  • Current State Assessments and Gap Analysis
  • Threats and Vulnerabilities
  • Type of Cyber attacks

Cybersecurity Incident Management

  • Incident categories
  • Incident response
  • Incident recovery

Future Implications & Evolving Technologies

  • Cloud Computing Security Requirements
  • BYOD Risk
  • Cloud concepts around data & collaboration
Sharing is Caring
Scroll to Top